Professional Documents
Culture Documents
REF:
[11CyberPhysicalSystems:APerspectiveatthe
Centennial
[2]R.Rajkumar,I.Lee,L.Sha,andJ.Stankovic,B
Cyberphysicalsystems:Thenextcomputingrevolution,
[inProc.47thDesignAutom.Conf.,2010,pp.731736.
[3]I.LeeandO.Sokolsky,Medicalcyberphysical
systems,inProc.47thACM/IEEEDes.Autom.Conf.,
Jul.2010,pp.743748.
[4]M.D.IlicL.Xie,U.A.Khan,andJ.M.F.Moura,
Modelingoffuturecyberphysicalenergysystemsfor
distributedsensingandcontrol,IEEETrans.Syst.,Man,
Cybern.A,Syst.,Humans,vol.40,no.4,pp.825838,
Jul.2010.
[5]FORAUTOMOTIVE.\
[6]J.SlayandM.Miller,BLessonslearnedfromthe
Maroochywaterbreach,[inCriticalInfrastructure
Protection,vol.253,E.GoetzandS.Shenoi,Eds.Boston,
MA:SpringerVerlag,2007,pp.7382.
[7]S.E.Schechter,J.Jung,andA.W.Berger,BFast
detectionofscanningworminfections,[inProc.7thInt.
Symp.RecentAdv.IntrusionDetection,2004,pp.5981.
[8]J.Leyden,BPolishteenderailstramafterhacking
trainnetwork,[TheRegister,2008.[Online].
Available:http://www.theregister.co.uk/2008/01/11/tram
_hack/.
[9]A.Greenberg,BHackerscutcitiespower,[Forbes,
2008.[Online].
Available:http://www.forbes.com/2008/01/18/cyber
attackutilitiestechintelcx_ag_0118attack.html.
[10]R.Esposito,BHackerspenetratewatersystem
computers,[ABCNews,2006.[Online].
Available:http://abcnews.go.com/blogs/headlines/2006/1
0/hackers_penetra/.
[11]S.Amin,A.Ca rdenas,andS.Sastry,Safeand
securenetworkedcontrolsystemsunderdenialofservice
attacks,inHybridSystems:ComputationandControl,
vol.5469,Apr.2009,pp.3145.
[12]Y.MoandB.Sinopoli,Securecontrolagainst
replayattacks,inAllertonConf.onCommunications,
ControlandComputing,Monticello,IL,USA,Sep.
2010,pp.911918.